Category | Machine | Started | Completed |
---|---|---|---|
FILE | s1_win7_x6402 | Sept. 28, 2021, 3:55 p.m. | Sept. 28, 2021, 4:14 p.m. |
-
hak.exe "C:\Users\test22\AppData\Local\Temp\hak.exe"
1052
IP Address | Status | Action |
---|---|---|
103.224.182.210 | Active | Moloch |
104.16.14.194 | Active | Moloch |
104.21.51.3 | Active | Moloch |
154.205.217.133 | Active | Moloch |
164.124.101.2 | Active | Moloch |
182.50.132.242 | Active | Moloch |
192.0.78.24 | Active | Moloch |
198.54.117.210 | Active | Moloch |
199.59.242.153 | Active | Moloch |
34.102.136.180 | Active | Moloch |
52.20.84.62 | Active | Moloch |
52.58.78.16 | Active | Moloch |
87.236.16.91 | Active | Moloch |
Suricata Alerts
Suricata TLS
No Suricata TLS
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.healthylifefit.com/mjyv/?uTuD=wu4G29Df/3jk6rtufY07T1aH5SRRTSPupQ0Am8+JIxBphBMLoCuvIjFknaaw90h7xGBdC+KC&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.bjjinmei.com/mjyv/?uTuD=tK48cpNOceqqCiIAD7hTSWdfMm0U+M5ICQ0DMQW4dcqulfLFmq83X0mVZBBYriEB2HGVoedd&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.murdabudz.com/mjyv/?uTuD=hg13/nVpXa7sw8wTOoVMHFZDgDUsR9Gv/arf8487HKoYm/D9BgH6B8HPQM6vzvqD84xy947Y&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.chatcure.com/mjyv/?uTuD=Q1v42zleUYIi8flkghcQmr8tAyGjsl4sXlxb78q+SjvyPDjFfh7215Q2cKPJE2klAkGZe5l7&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.ziototoristorante.com/mjyv/?uTuD=BGF3MaDqcKXz2+ypQpBN49HcofQtIb5uumrf5yGZXgK71e6jsOADztt5ugiiGjAz+eZLHYvw&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.volteraenergy.net/mjyv/?uTuD=6GSsGhXNJ4X+IglcYBeGMK5UD+vC/aYPjEqHkj3TutxRiNJSuqpeM1lWW/9MfcCLuZzXea82&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.simpeltattofor.men/mjyv/?uTuD=YF19YjsW8YJ3UOve4Qb3KBW5CTiNCbLMIoRIqgRYw5C7pHv6F5Yv7+2MVeO4kquiRvNeMbg8&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.welcome-sber.store/mjyv/?uTuD=Kv+/SJ7M/lzJbcaI/wLw7bttHXU14P8fHaqyHUXbe+/kB7RUPLEP6r3tla+4qncMfsOmfoJX&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.upgradepklohb.xyz/mjyv/?uTuD=9dnvdWURialXEyaz2ywPsOoM6gGuiR5AxFBltEEFKs81axtXl2dPjYUDr1hLwXJCVRBcbtND&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.single-on-purpose.com/mjyv/?uTuD=Q7OMrrO86y0JqdY0g4bf91NmCgnX6BTekei23iJFdfIv5eDZ2hVr8AZAqZJxsWpRuuzn5HXG&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.calmingscience.com/mjyv/?uTuD=88UrMb6q8kEA6d0RMNJBQg7TjSnN5axFSt02V9alnUE8WVXARanhd7Zn9ZpbXjvnPJPP0laE&Kj6dY=ATxxQ4G | ||||||
suspicious_features | GET method with no useragent header | suspicious_request | GET http://www.socialmediaplugin.com/mjyv/?uTuD=OU27+ysrGKu/jK/yOqR5sqFza95Uvw+WRzi5j7TKNAgvfz99QkpIgkjRoF2Ht6HwV+67RAOW&Kj6dY=ATxxQ4G |
request | GET http://www.healthylifefit.com/mjyv/?uTuD=wu4G29Df/3jk6rtufY07T1aH5SRRTSPupQ0Am8+JIxBphBMLoCuvIjFknaaw90h7xGBdC+KC&Kj6dY=ATxxQ4G |
request | GET http://www.bjjinmei.com/mjyv/?uTuD=tK48cpNOceqqCiIAD7hTSWdfMm0U+M5ICQ0DMQW4dcqulfLFmq83X0mVZBBYriEB2HGVoedd&Kj6dY=ATxxQ4G |
request | GET http://www.murdabudz.com/mjyv/?uTuD=hg13/nVpXa7sw8wTOoVMHFZDgDUsR9Gv/arf8487HKoYm/D9BgH6B8HPQM6vzvqD84xy947Y&Kj6dY=ATxxQ4G |
request | GET http://www.chatcure.com/mjyv/?uTuD=Q1v42zleUYIi8flkghcQmr8tAyGjsl4sXlxb78q+SjvyPDjFfh7215Q2cKPJE2klAkGZe5l7&Kj6dY=ATxxQ4G |
request | GET http://www.ziototoristorante.com/mjyv/?uTuD=BGF3MaDqcKXz2+ypQpBN49HcofQtIb5uumrf5yGZXgK71e6jsOADztt5ugiiGjAz+eZLHYvw&Kj6dY=ATxxQ4G |
request | GET http://www.volteraenergy.net/mjyv/?uTuD=6GSsGhXNJ4X+IglcYBeGMK5UD+vC/aYPjEqHkj3TutxRiNJSuqpeM1lWW/9MfcCLuZzXea82&Kj6dY=ATxxQ4G |
request | GET http://www.simpeltattofor.men/mjyv/?uTuD=YF19YjsW8YJ3UOve4Qb3KBW5CTiNCbLMIoRIqgRYw5C7pHv6F5Yv7+2MVeO4kquiRvNeMbg8&Kj6dY=ATxxQ4G |
request | GET http://www.welcome-sber.store/mjyv/?uTuD=Kv+/SJ7M/lzJbcaI/wLw7bttHXU14P8fHaqyHUXbe+/kB7RUPLEP6r3tla+4qncMfsOmfoJX&Kj6dY=ATxxQ4G |
request | GET http://www.upgradepklohb.xyz/mjyv/?uTuD=9dnvdWURialXEyaz2ywPsOoM6gGuiR5AxFBltEEFKs81axtXl2dPjYUDr1hLwXJCVRBcbtND&Kj6dY=ATxxQ4G |
request | GET http://www.single-on-purpose.com/mjyv/?uTuD=Q7OMrrO86y0JqdY0g4bf91NmCgnX6BTekei23iJFdfIv5eDZ2hVr8AZAqZJxsWpRuuzn5HXG&Kj6dY=ATxxQ4G |
request | GET http://www.calmingscience.com/mjyv/?uTuD=88UrMb6q8kEA6d0RMNJBQg7TjSnN5axFSt02V9alnUE8WVXARanhd7Zn9ZpbXjvnPJPP0laE&Kj6dY=ATxxQ4G |
request | GET http://www.socialmediaplugin.com/mjyv/?uTuD=OU27+ysrGKu/jK/yOqR5sqFza95Uvw+WRzi5j7TKNAgvfz99QkpIgkjRoF2Ht6HwV+67RAOW&Kj6dY=ATxxQ4G |
section | {u'size_of_data': u'0x00027c00', u'virtual_address': u'0x00001000', u'entropy': 7.328005143193911, u'name': u'.text', u'virtual_size': u'0x00027b7c'} | entropy | 7.32800514319 | description | A section with a high entropy has been found | |||||||||
entropy | 1.0 | description | Overall entropy of this PE file is high |
Bkav | W32.AIDetect.malware1 |
Lionic | Trojan.Multi.Generic.4!c |
Elastic | malicious (high confidence) |
MicroWorld-eScan | Gen:Variant.Razy.679962 |
McAfee | GenericRXLS-VV!3B710CC2FD2E |
Cylance | Unsafe |
K7AntiVirus | Trojan ( 00536d121 ) |
K7GW | Trojan ( 00536d121 ) |
Cybereason | malicious.2fd2ed |
Arcabit | Trojan.Razy.DA601A |
BitDefenderTheta | AI:Packer.F58C5BA21E |
Cyren | W32/Formbook.A.gen!Eldorado |
Symantec | Trojan.Formbook |
ESET-NOD32 | a variant of Win32/Formbook.AA |
Paloalto | generic.ml |
ClamAV | Win.Malware.Formbook-9802749-0 |
Kaspersky | HEUR:Trojan.Win32.Generic |
BitDefender | Gen:Variant.Razy.679962 |
NANO-Antivirus | Virus.Win32.Gen.ccmw |
Avast | Win32:Formbook-B [Trj] |
Ad-Aware | Gen:Variant.Razy.679962 |
Emsisoft | Trojan.Formbook (A) |
DrWeb | Trojan.Siggen9.48175 |
McAfee-GW-Edition | BehavesLike.Win32.Generic.cc |
FireEye | Generic.mg.3b710cc2fd2ed7c2 |
Sophos | ML/PE-A + Troj/Formbook-A |
APEX | Malicious |
Avira | TR/Crypt.ZPACK.Gen |
MAX | malware (ai score=85) |
Microsoft | Trojan:Win32/Formbook!MTB |
ZoneAlarm | HEUR:Trojan.Win32.Generic |
GData | Gen:Variant.Razy.679962 |
Cynet | Malicious (score: 100) |
Acronis | suspicious |
VBA32 | BScope.TrojanPSW.Banker |
ALYac | Gen:Variant.Razy.679962 |
Malwarebytes | Spyware.FormBook |
Ikarus | Trojan-Spy.FormBook |
Rising | Trojan.Generic@ML.100 (RDML:mAbFVIx0MKNPsSp0/0mlww) |
SentinelOne | Static AI - Malicious PE |
Fortinet | W32/GenKryptik.AYEB!tr |
AVG | Win32:Formbook-B [Trj] |
CrowdStrike | win/malicious_confidence_90% (W) |